{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-12344","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2024-12-08T07:51:44.661Z","datePublished":"2024-12-08T23:00:16.366Z","dateUpdated":"2024-12-09T15:48:32.305Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-12-08T23:00:16.366Z"},"title":"TP-Link VN020 F3v(T) FTP USER Command memory corruption","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"TP-Link","product":"VN020 F3v(T)","versions":[{"version":"TT_V6.2.1021","status":"affected"}],"modules":["FTP USER Command Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as critical, was found in TP-Link VN020 F3v(T) TT_V6.2.1021. This affects an unknown part of the component FTP USER Command Handler. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."},{"lang":"de","value":"Es wurde eine kritische Schwachstelle in TP-Link VN020 F3v(T) TT_V6.2.1021 gefunden. Es betrifft eine unbekannte Funktion der Komponente FTP USER Command Handler. Dank der Manipulation mit unbekannten Daten kann eine memory corruption-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2024-12-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2024-12-08T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2024-12-08T08:56:48.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Mohamed Maatallah (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.287265","name":"VDB-287265 | TP-Link VN020 F3v(T) FTP USER Command memory corruption","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.287265","name":"VDB-287265 | CTI Indicators (IOB, IOC)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.452658","name":"Submit #452658 | TP-Link VN020 F3v(T) Hardware Version: 1.0 /  Firmware Version: TT_V6.2.1021 Buffer Overflow & Memory corruption","tags":["third-party-advisory"]},{"url":"https://github.com/Zephkek/TP-1450","tags":["exploit"]},{"url":"https://www.tp-link.com/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-09T15:48:11.958537Z","id":"CVE-2024-12344","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-09T15:48:32.305Z"}}]}}